EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 8 : Network Forensics
         
Questions available : 133 You are not logged in.
Please Login for track your learning progress
   
 
Q. No: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
Go to Question No.



Question No 0


If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
 

   
Bookmark this Question
QID: 620  
   
Gilchrist, an employee in a reputed organization that conducts forensic investigations, was bribed by an external party to steal an important evidence related to the ongoing case, which involved renowned cricketers. As per the deal, he had to compromise the computer that contained the evidence, but the computer was connected to a password protected wireless network within the organization. Gilchrist himself being a hacker tried various password attacks on the wireless network and finally cracked it, after which he connected to the network and compromised the computer to steal the evidence. But this act triggered the intrusion detection systems in the organization, thereby alerting the security team. The team headed by Mr Robert began to investigate the incident to trace the attacker (here, Gilchrist). During investigation, Robert found that the someone within the organization was responsible for the incident. After several investigation procedures, Robert caught Gilchrist with a solid evidence, and his computer was seized. By examining which registry location in the Gilchrist‘s system did Robert prove that the hacker had been connected to the XYZ wireless network?


 
A:    HKEY_CURRENT_USER∖Software∖Microsoft∖Internet Explorer∖TypedURLs
 
B:    HKEY_LOCAL_MACHINE∖System∖Services∖CurrentControlSet∖services∖ Tcpip∖Parameters∖ Interfaces
C:    HKEY_CURRENT_USER∖Software∖Microsoft∖Windows∖CurrentVersion∖ Explorer∖ RecentDocs
 
D:    HKEY_LOCAL_MACHINE∖SOFTWARE∖Microsoft∖Windows NT∖ CurrentVersion∖ NetworkList∖ Profiles
 
         

 
 

Diffence opinion in Correct Answer or any comment?
Vote / Comment for correct Answer



Comunity Comments:

Banwari on 21/05/2025
Opted Answer: D
profiles: Stores information about Network profiles on a Windows system.
it track networks the device has connected to, including details like SSID (network name) and connection settings.

Interfaces: to store network configuration settings for different network interfaces. this registry key contains network interface settings, including IP configurations, which helped investigators trace the unauthorized access.

















WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations